Unit - 1 DCN
Unit - 1 DCN
1. Network Devices
Basic hardware interconnecting network nodes, such as Network Interface Cards
(NICs), Bridges, Hubs, Switches, and Routers, are used in all networks. In
addition, a mechanism for connecting these building parts is necessary, which is
usually galvanic cable and optical cable are less popular ("optical fiber")The
following are the network devices :
• NIC (Network Interface Card): A network card, often known as a network
adapter or NIC (network interface card), is computer hardware that enables
computers to communicate via a network. It offers physical access to networking
media and, in many cases, MAC addresses serve as a low-level addressing scheme.
Hub: A hub is a device that joins together many twisted pairs or fiber optic
Ethernet devices to give the illusion of a formation of a single network segment. A
network hub is a relatively simple broadcast device. Any packet entering any port
is regenerated and broadcastout on all other ports, and hubs do not control any of
the traffic that passes through them.
Bridges: Bridges broadcast data to all the ports but not to the one that received
the transmission. Once a port and an address are associated, the bridge will only
transport traffic from that address to that port.
Switches: A switch differs from a hub in that it only forwards frames to the ports
that are participating in the communication, rather than all of the ports that are
connected.
Routers:- A router is a computer networking device that links two or more computer
networks and selectively exchanges data packets between them. A router can use
address information in each data packet to determine if the source and destination
are on the same network or if the data packet has to be transported between
networks.
2. Links
Links are the ways information travels between devices, and they can be of two
types:
3. Communication Protocols
A communication protocol is a set of rules that all devices follow when they share
information. Some common protocols are TCP/IP, IEEE 802, Ethernet, wireless LAN,
and cellular standards. TCP/IP is a model that organizes how communication works in
modern networks. It has four functional layers for these communication links:
Whenever a Computer Network is working, nodes have the work of sending and
receiving data via the links. Computer Network provides some set of protocols that
help in following the rules and protocols.
• Military applications: Military networks are often closed and not used
for general communication, which ensures the safety of military information.
• Scientific applications: Scientific research heavily depends on
computer networks because they will help establish collaboration among researchers
and facilitate the sharing of data and information.
• Banking and finance applications: The banks and finance sector are the
biggest users of computer networks to carry out transactional processing,
information sharing, and the provision of secure access to financial services
A Local area network (LAN) is a network that is used to link devices in a single
office, building, or campus of up to a short distance. LAN is restricted in size.
In LAN networks internet speed is from 10 Mbps to 100 Mbps (But now much higher
speeds can be achieved). The most common topologies used in LAN networks are bus,
ring, and star. Imagine your home Wi-Fi network. All the devices connected to it,
like your computer, phone, or smart TV, form a LAN. They can share files, printers,
and internet access, making it easy to work and play together.
If we connect LAN in a real-life example then the family is the best example each
family member is connected to each other in the same way each device is connected
to the network. Several experimental and early commercial LAN technologies were
developed in the 1970s. Cambridge Ring is a type of LAN that was developed at
Cambridge University in 1974.
LANs nearly always connect devices to the network via Ethernet, WiFi, or both of
these technologies. Ethernet is a way to connect devices to the Local Area Network
ethernet define the physical and data link layer of the OSI model. WiFi is a
protocol that is used to connect devices to the Local Area Network wirelessely.
There are many devices that is connected to the LAN for example Servers, desktop
computers, laptops, printers, Internet of Things (IoT) devices, and even game
consoles.
Types of LAN
There are different architectures in LAN as discussed below-
2.) Peer-to-Peer LANs: Peer-to-peerLANs are commonly smaller because they shortage
a central server and can't support huge workloads like client/server LANs can.
Through wired or wireless connections to a switch or router, the devices share data
and resources. Peer-to-peer networks are the norm in homes.
3.) Ethernet: It is most widely used architecture. ethernet specifies the network
speed, cable type and network interface adapters. This type of architecture used in
both wired or wireless networks.
4.) Token ring: Token ring is a type of local area network (LAN) setup that was
once widely used but is now less common. It manages network access through the use
of tokens and has an operating speed of 100 megabits per second.
What is a Virtual LAN?
The same physical network can have its traffic divided into two networks using
virtual LANs, or VLANs.
Imagine establishing two independent LANs in the same room, each with its own
router and Internet connection. Similar to that, but with only one router and one
Internet connection required, VLANs divide networks virtually rather than
physically.
What is a WAN?
WAN stands for Wide Area Network. It is a computer network that covers a large
geographical area consisting of two or more LANs or MANs. These networks are
established with leased telecommunicationcircuits, in which two sides which are
connected have routers that connect the LAN of both sides together in a network to
facilitate communication.
History of WAN
The roots of WAN are connected to the U.S Department of defense which developed
ARPANET to let researchers communicate and share computer resources remotely. The
connection can be circuit-switched telephone lines, radio wave transmission or
optical fibertransmission. It is used to exchange data with users all over the
world.
Characteristics of WAN
• Broader Reach: The reach of WAN in terms coverage of geographical area
is very high which can be a region, country or the world itself.
• Higher Capacity: The capacity of WAN in terms of number of LANs or
WANsconnected in a network is very high, which results in connection of large
number of user over different location all around the globe.
• Use of Public Carrier: WAN uses telephone network, cabled system,
satellites etc for connection and transmission purpose which are easily available.
• Resource Sharing: WAN enables its users to share data and information
over large area. Computer resources can be accessed remotely which makes
transmission and exchange of data very easy.
Advantages of WAN
Disadvantages of WAN
MAN stands for Metropolitan Area Network. It is a computer network that connects
number of LANs to form larger network, so that the computer resources can be
shared. This type of network covers larger area than a LAN but smaller than the
area covered by a WAN which is designed to extend over the entire city. MAN is
specially designed to provide high-speed connectivity to the users in which the
speed ranges in terms of Mbps. The architecture of MAN is quite complicated
hence,it is hard to design and maintain.
History of MAN
When LANs are establishes in 1994 in order to provide data communication in
building and offices, the businesses are primarily relied on public switched
telephone networks for the interconnection of LANs. But the telephone network was
not capable enough to handle that much of traffic. Hence, to overcome this problem
it was suggested that LANs are connected using the single-mode optical fiber lines,
which results in the creation of metropolitan area network(MAN) to provide the
interconnection of LANs efficiently.
Characteristics of MAN
• It can covers the area which ranges from 5 to 50 km, which is capable
of carrying from a group of buildings to the whole city.
• In MAN, data rates are moderate to high.
• In MAN, mostly used medium is optical fibers which results in high-
speed connectivity.
• MAN networks provides high reliability because the error rate in this
network is very less.
• A MAN network can use a variety of access technologies, such as
wireless, fiber-optic, or copper-based connections, to provide connectivity to
different devices and networks.
• Hybrid topology: A MAN network may use a combination of different
topologies, such as a ring, bus, or star topology, depending on the specific
requirements of the network.
Advantages of MAN
• MAN offers high-speed connectivity in which the speed ranges from 10-
100 Mbps.
• The security level in MAN is high and strict as compared to WAN.
• It support to transmit data in both directions concurrently because of
dual bus architecture.
• MAN can serve multiple users at a time with the same high-speed
internet to all the users.
• MAN allows for centralized management and control of the network,
making it easier to monitor and manage network resources and security.
Disadvantages of MAN
• The architecture of MAN is quite complicated hence, it is hard to
design and maintain.
• This network is highly expensive because it required the high cost to
set up fiber optics.
• It provides less fault tolerance.
• The Data transfer rate in MAN is low when compare to LANs.
Examples of MAN
• Cable TV network.
• Used in government agencies.
• University campuses.
• Used in hospitals to connect multiple buildings
Uses of MAN Network
A Metropolitan Area Network (MAN) has several uses, including:
1. Resource Sharing: A MAN allows multiple LANs in a metropolitan area to
share resources such as printers, storage devices, and other peripherals.
2. Data Exchange: A MAN provides a high-speed communication channel for
the exchange of data between different LANs.
3. Internet Access: A MAN can provide high-speed internet access to users
in a metropolitan area.
4. Video and Audio Streaming: A MAN can support video and audio streaming
for applications such as video conferencing and multimedia presentations.
5. Backup and Recovery: A MAN can provide backup and recovery services for
data stored on multiple LANs.
OSI MODEL
The OSI (Open Systems Interconnection) Model is a set of rules that explains how
different computer systems communicate over a network. OSI Model was developed by
the International Organization for Standardization (ISO). The OSI Model consists of
7 layers and each layer has specific functions and responsibilities. This layered
approach makes it easier for different devices and technologies to work together.
OSI Model provides a clear structure for data transmission and managing network
issues. The OSI Model is widely used as a reference to understand how network
systems function.
• Bit Rate Control: The Physical layer also defines the transmission rate
i.e. the number of bits sent per second.
• Transmission Mode: Physical layer also defines how the data flows
between the two connected devices. The various transmission modes possible are
Simplex, half-duplex and full duplex.
• Physical Addressing: After creating frames, the Data link layer adds
physical addresses (MAC addresses)of the sender and/or receiver in the header of
each frame.
• Error Control: The data link layer provides the mechanism of error
control in which it detects and retransmits damaged or lost frames.
• Flow Control: The data rate must be constant on both sides else the
data may get corrupted thus, flow control coordinates the amount of data that can
be sent before receiving an acknowledgment.
• Access Control: When a single communication channel is shared by
multiple devices, the MAC sub-layer of the data link layer helps to determine which
device has control over the channel at a given time.
At the sender's side, the transport layer receives the formatted data from the
upper layers, performs Segmentation, and also implements Flow and error control to
ensure proper data transmission. It also adds Source and Destination port numberin
its header and forwards the segmented data to the Network Layer.
• Generally, this destination port number is configured, either by
default or manually. For example, when a web application requests a web server, it
typically uses port number 80, because this is the default port assigned to web
applications. Many applications have default ports assigned.
At the Receiver’s side, Transport Layer reads the port number from its header and
forwards the Data which it has received to the respective application. It also
performs sequencing and reassembling of the segmented data.
Example
Let us consider a scenario where a user wants to send a message through some
Messenger application running in their browser. The “Messenger” here acts as the
application layer which provides the user with an interface to create the data.
This message or so-called Data is compressed, optionally encrypted (if the data is
sensitive), and converted into bits (0’s and 1’s) so that it can be transmitted.
Layer 6 - Presentation Layer
The presentation layer is also called theTranslation layer. The data from the
application layer is extracted here and manipulated as per the required format to
transmit over the network. Protocols used in the Presentation Layer are JPEG, MPEG,
GIF, TLS/SSL, etc.
Functions of the Presentation Layer
• Translation: For example, ASCII to EBCDIC.
• Encryption/ Decryption: Data encryption translates the data into
another form or code. The encrypted data is known as the ciphertext, and the
decrypted data is known as plain text. A key value is used for encrypting as well
as decrypting data.
• Compression: Reduces the number of bits that need to be transmitted on
the network.
We can understand how data flows through OSI Model with the help of an example
mentioned below.
Let us suppose, Person A sends an e-mail to his friend Person B.
Step 1: Person A interacts with e-mail application like Gmail, outlook, etc. Writes
his email to send. (This happens atApplication Layer).
Step 2: At Presentation Layer, Mail application prepares for data transmission like
encrypting data and formatting it for transmission.
Step 3: At Session Layer, there is a connection established between the sender and
receiver on the internet.
Step 4: At Transport Layer, Email data is broken into smaller segments. It adds
sequence number and error-checking information to maintain the reliability of the
information.
Step 5: At Network Layer, addressing of packets is done in order to find the best
route for transfer.
Step 6: At Data Link Layer, data packets are encapsulated into frames, then MAC
address is added for local devices and then it checks for error using error
detection.
After the email reaches the receiver i.e. Person B, the process will reverse and
decrypt the e-mail content. At last, the email will be shown on Person B email
client.
• Each layer in the OSI Model adds its own set of rules and operations,
which can make the process more time-consuming and less efficient.
TCP-IP MODEL
Each layer has specific functions that help manage different aspects of network
communication, making it essential for understanding and working with modern
networks.
TCP/IP was designed and developed by the Department of Defense (DoD) in the 1970s
and is based on standard protocols. The TCP/IP model is a concise version of the
OSI model. It contains four layers, unlike the seven layers in the OSI model.
Role of TCP/IP
TCP/IP enables interoperability between diverse systems over various network types
(e.g., copper, fiber, wireless). It ensures seamless communication across LANs,
WANs, and the internet. Without TCP/IP, large-scale global networking would not be
possible.
The main condition of this process is to make data reliable and accurate so that
the receiver will receive the same information which is sent by the sender. To
ensure that, each message reaches its final destination accurately, the TCP/IP
model divides its data into packets and combines them at the other end, which helps
in maintaining the accuracy of the data while transferring from one end to another
end.

TCP
• Inefficiency for Small Networks : For very small networks, the overhead
and complexity of the TCP/IP model may be unnecessary and inefficient compared to
simpler networking protocols.
Network devices are physical devices that allow hardware on a computer network to
communicate and interact with each other. Network devices like hubs, repeaters,
bridges, switches, routers, gateways, and brouter help manage and direct data flow
in a network. They ensure efficient communication between connected devices by
controlling data transfer, boosting signals, and linking different networks. Each
device serves a specific role, from simple data forwarding to complex routing
between networks.
• Layer 2 Switches: These switches operate at the Data Link layer of the
OSI model and are responsible for forwarding data between devices on the same
network segment.
Router
A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network Layer device. Routers normally connect
LANs and WANs and have a dynamically updating routing table based on which they
make decisions on routing the data packets. The router divides the broadcast
domains of hosts connected through it.
Gateway
A gateway, as the name suggests, is a passage to connect two networks that may work
upon different networking models. They work as messenger agents that take data from
one system, interpret it, and transfer it to another system. Gateways are also
called protocol converters and can operate at any network layer. Gateways are
generally more complex than switches or routers.
Brouter
It is also known as the bridging router is a device that combines features of both
bridge and router. It can work either at the data link layer or a network layer.
Working as a router, it is capable of routing packets across networks and working
as a bridge, it is capable of filtering local area network traffic.
NIC
NIC or network interface card is a network adapter that is used to connect the
computer to the network. It is installed in the computer to establish a LAN. It
has a unique ID that is written on the chip, and it has a connector to connect the
cable to it. The cable acts as an interface between the computer and the router or
modem. NIC is a layer 2 device which means that it works on both the physical and
data link layers of the network model.
Transmission Media
Transmission media is the physical medium through which data is transmitted from
one device to another within a network. These media can be wired or wireless. The
choice of medium depends on factors like distance, speed, and interference.
1. Guided Media
Guided Media is also referred to as Wired or Bounded transmission media. Signals
being transmitted are directed and confined in a narrow pathway by using physical
links.
Features:
• High Speed
• Secure
• Used for comparatively shorter distances
There are 3 major types of Guided Media:
Coaxial Cable
Coaxial cable has an outer plastic covering containing an insulation layer made of
PVC or Teflon and 2 parallel conductors each having a separate insulated protection
cover. The coaxial cable transmits information in two modes: Baseband
mode(dedicated cable bandwidth) and Broadband mode(cable bandwidth is split into
separate ranges). Cable TVs and analog television networks widely use Coaxial
cables.
2. Unguided Media
It is also referred to as Wireless or Unbounded transmission media . No physical
medium is required for the transmission of electromagnetic signals.
Features of Unguided Media
• The signal is broadcasted through air
• Less Secure
• Used for larger distances
There are 3 types of Signals transmitted through unguided media:
Radio Waves
Radio waves are easy to generate and can penetrate through buildings. The sending
and receiving antennas need not be aligned. Frequency Range:3KHz - 1GHz. AM and FM
radios and cordless phones use Radio waves for transmission.
Types of Radio Waves:
• Short Wave: AM Radio
• VHF (Very High Frequency): FM Radio/TV
• UHF (Ultra High Frequency): TV
Radio Wave Components:
• Transmitter: Responsible for encoding the signal.
• Receiver: Responsible for decoding the signal.

Radiowave
Microwaves
It is a line of sight transmission i.e. the sending and receiving antennas need to
be properly aligned with each other. The distance covered by the signal is directly
proportional to the height of the antenna. Frequency Range:1GHz - 300GHz. Micro
waves are majorly used for mobile phone communication and television distribution.
Advantages:
• Cheaper than using cables
• Freedom from land acquisition
• Ease of communication in difficult terrains
• Communication over oceans
Disadvantages:
• Insecure communication.
• Out of phase signal.
• Susceptible to weather conditions.
• Bandwidth is limited.
• High cost of design, implementation, and maintenance.
Infrared
Infrared waves are used for very short distance communication. They cannot
penetrate through obstacles. This prevents interference between systems. Frequency
Range:300GHz - 400THz. It is used in TV remotes, wireless mouse, keyboard, printer,
etc.
• Unicast transmission
• Broadcast transmission
• Multicast transmission

Unicast Transmission (One-to-One)
In Unicast transmission, the data is transferred from a single sender (or a single
source host) to a single receiver (or a single destination host).
The network switches hear the MAC addresses of the devices on the networks to which
they are connected. They can then forward packets only onto those networks
containing devices with the connected MAC addresses. Unicast gradually becomes less
efficient as more receivers need to see identical data.
Example
In the following figure, Host A sends the IP address 11.1.2.2 data to the Host B IP
address 20.12.4.3.
• Source Address = IP address of host A is 11.1.2.2
• Destination Address = IP address of host B is 20.12.4.3

Directed Broadcast
Directed Broadcast transmits data from one source host to all the other hosts that
exist in some other network. It is used in two scenarios
• When the hosts are responsible for parsing data from
broadcast packets.
• When all the hosts require the same data.

Limited Broadcast
In Limited Broadcast, the data is transmitted from a single source host to all the
other hosts residing in the same network.
Simplex Mode
In Simplex mode, the communication is unidirectional, as on a one-way street. Only
one of the two devices on a link can transmit, the other can only receive. The
simplex mode can use the entire capacity of the channel to send data in one
direction. Example: Keyboard and traditional monitors. The keyboard can only
introduce input, the monitor can only give the output.

Advantages of Simplex Mode
• Simplex mode is the easiest and most reliable mode of communication.
• It is the most cost-effective mode, as it only requires one
communication channel.
• There is no need for coordination between the transmitting and
receiving devices, which simplifies the communication process.
• Simplex mode is particularly useful in situations where feedback or
response is not required, such as broadcasting or surveillance.
Half-Duplex Mode
In half-duplex mode, each station can both transmit and receive, but not at the
same time. When one device is sending, the other can only receive, and vice versa.
The half-duplex mode is used in cases where there is no need for communication in
both directions at the same time. The entire capacity of the channel can be
utilized for each direction. Example: Walkie-talkie in which message is sent one at
a time and messages are sent in both directions.
Channel capacity=Bandwidth * Propagation Delay

Advantages of Half Duplex Mode
• Half-duplex mode allows for bidirectional communication, which is
useful in situations where devices need to send and receive data.
• It is a more efficient mode of communication than simplex mode, as the
channel can be used for both transmission and reception.
• Half-duplex mode is less expensive than full-duplex mode, as it only
requires one communication channel.
Full-Duplex Mode
In full-duplex mode, both stations can transmit and receive simultaneously. In
full_duplex mode, signals going in one direction share the capacity of the link
with signals going in another direction, this sharing can occur in two ways:
• Either the link must contain two physically separate transmission
paths, one for sending and the other for receiving.
• Or the capacity is divided between signals traveling in both
directions.
Full-duplex mode is used when communication in both directions is required all the
time. The capacity of the channel, however, must be divided between the two
directions. Example: Telephone Network in which there is communication between two
persons by a telephone line, through which both can talk and listen at the same
time.
Channel Capacity=2* Bandwidth*propagation Delay
Advantages of Full-Duplex Mode
• Full-duplex mode allows for simultaneous bidirectional communication,
which is ideal for real-time applications such as video conferencing or online
gaming.
• It is the most efficient mode of communication, as both devices can
transmit and receive data simultaneously.
• Full-duplex mode provides a high level of reliability and accuracy, as
there is no need for error correction mechanisms.
Network Toplogies:-
Network topology refers to the arrangement of different elements like nodes, links,
or devices in a computer network. Common types of network topology include bus,
star, ring, mesh, and tree topologies, each with its advantages and disadvantages.
Mesh Topology
In a mesh topology, every device is connected to another device via a particular
channel. Every device is connected to another via dedicated channels. These
channels are known as links. In Mesh Topology, the protocols used are AHCP (Ad Hoc
Configuration Protocols), DHCP (Dynamic Host Configuration Protocol), etc.

Mesh Topology
• Suppose, the N number of devices are connected with each other in a
mesh topology, the total number of ports that are required by each device is N-1.
In Figure , there are 6 devices connected to each other, hence the total number of
ports required by each device is 5. The total number of ports required = N * (N-1).
• Suppose, N number of devices are connected with each other in a mesh
topology, then the total number of dedicated links required to connect them is N C
2 i.e. N(N-1)/2. In Figure, there are 6 devices connected to each other, hence the
total number of links required is 6*5/2 = 15.
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable.
This hub is the central node and all other nodes are connected to the central node.
The hub can be passive in nature i.e., not an intelligent hub such as broadcasting
devices, at the same time the hub can be intelligent known as an active hub. Active
hubs have repeaters in them. Coaxial cables or RJ-45 cables are used to connect the
computers. In Star Topology, many popular Ethernet LAN protocols are used as
CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
Star Topology
Bus Topology
Bus Topology is a network type in which every computer and network device is
connected to a single cable. It is bi-directional. It is a multi-point connection
and a non-robust topology because if the backbone fails the topology crashes. In
Bus Topology, various MAC (Media Access Control) protocols are followed by LAN
ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Bus Topology
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring
devices. A number of repeaters are used for Ring topology with a large number of
nodes, because if someone wants to send some data to the last node in the ring
topology with 100 nodes, then the data will have to pass through 99 nodes to reach
the 100th node. Hence to prevent data loss repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made
bidirectional by having 2 connections between each Network Node, it is called Dual
Ring Topology. In-Ring Topology, the Token Ring Passing protocol is used by the
workstations to transmit the data.
Ring Topology
The most common access method of ring topology is token passing.
• Token passing: It is a network access method in which a token is passed
from one node to another node.
• Token: It is a frame that circulates around the network.
Tree Topology
Tree topology is the variation of the Star topology. This topology has a
hierarchical flow of data. In Tree Topology, protocols like DHCP and SAC (Standard
Automatic Configuration) are used.
Tree Topology
In tree topology, the various secondary hubs are connected to the central hub which
contains the repeater. This data flow from top to bottom i.e. from the central hub
to the secondary and then to the devices or from bottom to top i.e. devices to the
secondary hub and then to the central hub. It is a multi-point connection and a
non-robust topology because if the backbone fails the topology crashes.
Hybrid Topology
Hybrid Topology is the combination of all the various types of topologies we have
studied above. Hybrid Topology is used when the nodes are free to take any form. It
means these can be individuals such as Ring or Star topology or can be a
combination of various types of topologies seen above. Each individual topology
uses the protocol that has been discussed earlier.
Hybrid Topology
The above figure shows the structure of the Hybrid topology. As seen it contains a
combination of all different types of networks.

◦